Fraud detection mechanism adapted for inconsistent data collection
First Claim
1. In a verification system having items intended for a single use, in which usage of an item is confirmed by scanning an identification number associated with the item, and wherein scanning activity is inconsistent, a method for identifying possible fraudulent use of the identification numbers by a user comprising:
- creating a profile of scanning activity for substantially all items that meet a first parameter, the profile including data related to multiple scanning rates for items that meet the first parameter;
creating a profile of scanning activity for substantially all items used by a specified user, the profile including data related to multiple scanning rates for items used by the specified user;
determining if a multiple scanning rate from the profile of scanning activity for substantially all items used by the specified user is greater than a first threshold value, the first threshold value being based on a corresponding multiple scanning rate from the profile of scanning activity for substantially all items that meet the first parameter; and
if the multiple scan rate from the profile of scanning activity for substantially all items used by a specified user is greater than the first threshold value, identifying the specified user as a suspect for possible fraudulent use of the identification numbers.
3 Assignments
0 Petitions
Accused Products
Abstract
Fraud detection mechanisms and methods that are adapted for inconsistent data collection are provided. Data is analyzed to determine normal operational variations from ideal system behavior. Profiles are developed for each individual sender, e.g., the number of multiple scans performed per confirmation number generated by each sender, and other parameters, such as delivery areas, e.g., the number of multiple scans performed per specific geographic area. If the sender'"'"'s profile differs significantly from the normal operational variations, there is an indication of potential fraudulent activity and an investigation can be initiated. By analyzing a combination of sender and delivery scan data with system wide scan data, the effect of inconsistent data is minimized to significantly reduce the number of erroneous indications of fraudulent activity while still providing a high level of fraud detection.
31 Citations
29 Claims
-
1. In a verification system having items intended for a single use, in which usage of an item is confirmed by scanning an identification number associated with the item, and wherein scanning activity is inconsistent, a method for identifying possible fraudulent use of the identification numbers by a user comprising:
-
creating a profile of scanning activity for substantially all items that meet a first parameter, the profile including data related to multiple scanning rates for items that meet the first parameter;
creating a profile of scanning activity for substantially all items used by a specified user, the profile including data related to multiple scanning rates for items used by the specified user;
determining if a multiple scanning rate from the profile of scanning activity for substantially all items used by the specified user is greater than a first threshold value, the first threshold value being based on a corresponding multiple scanning rate from the profile of scanning activity for substantially all items that meet the first parameter; and
if the multiple scan rate from the profile of scanning activity for substantially all items used by a specified user is greater than the first threshold value, identifying the specified user as a suspect for possible fraudulent use of the identification numbers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for identifying possible fraudulent use of identification numbers associated with items intended for a single use, wherein usage of an item is confirmed by scanning the identification number associated with the item, and wherein scanning activity is inconsistent, the system comprising:
-
a database for storing data associated with scanning the identification numbers;
means for creating a profile, from the data stored in the database, of scanning activity for substantially all items that meet a fist parameter, the profile including data related to multiple scanning rates for items that meet the first parameter;
means for creating, from the data stored in the database, a profile of scanning activity for substantially all items used by a specified user, the profile including data related to multiple scanning rates for items used by the specified user; and
means for determining if a multiple scanning rate from the profile of scanning activity for substantially all items used by the specified user is greater than a first threshold value, the first threshold value being based on a corresponding multiple scanning rate from the profile of scanning activity for substantially all items that meet the first parameter;
wherein if the multiple scan rate from the profile of scanning activity for substantially all items used by a specified user is greater than the first threshold value, specified user is identified as a suspect for possible fraudulent use of the identification numbers. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification